{"title":"基于蜜罐的Web服务入侵攻击模式分析与签名提取","authors":"N. Dagdee, Urjita Thakar","doi":"10.1109/ICETET.2008.192","DOIUrl":null,"url":null,"abstract":"With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots\",\"authors\":\"N. Dagdee, Urjita Thakar\",\"doi\":\"10.1109/ICETET.2008.192\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.\",\"PeriodicalId\":269929,\"journal\":{\"name\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2008.192\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2008.192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots
With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.